Bringing out the best in people, uncove...
Whatever your business, it’s PEOPLE. Whether designing new software, a bridge, running a store, running a power plant, it’s PEOPLE … and, too often, well meaning executives, managers, and supervisors fall short in bringing out the best in those around them. We can look to great leaders and learn a many lessons. For example, more books have been written about Abraham Lincoln than just about any leader for just this reason ...
June 13, 2012
Organizer:
MSBCoach, LLC Location:
Charlottesville, VA
GovWin Consulting and McLane Advanced T...
McLane Advanced Technologies (MAT), a logistics solution provider, was contracted by the Army to consolidate several logistics systems into one, the Standard Army Maintenance System, Enhanced (SAM-E). The goal of this project was to modernize and maintain this interim system, while the Army completed the Global Combat Support System. After their successful work with the Army, MAT wanted to pursue other markets that could benefit from their se...
June 13, 2012
Organizer:
Deltek Location:
Herndon, VA
Los Angeles Area Outreach to the Nation...
May 16, 2012 On behalf of the Cross-Sector Supply Chain Workgroup: With the release of the President’s National Strategy for Global Supply Chain Security (the Strategy) in January 2012, the Department of Homeland Security and the Cross-Sector Supply Chain Workgroup (CSSCWG) are reaching out to state and local governments, and industry, on a regional level to conduct meetings to discuss the Strategy and a path forward for its implementati...
TECHEXPO Top Secret Reston, VA
Explore new career opportunities this June! Bring many resumes and interview for the many opportunities available in cyber security, information technology, engineering, aerospace, telecom, project management, intelligence, operations, homeland security, research & more at TECHEXPO Top Secret's June hiring events! Wednesday, June 13th • 10am - 3pm Sheraton Reston 11810 Sunrise Valley Drive Reston, VA 20191 Directions Only: 703.620.900...
Cybersecurity: The Next Step in Continu...
How can you possibly monitor all the alerts you are getting? What do you do once you've identified a serious alert? How do you quickly and effectively find out its location on your network and eradicate it? To learn the answers to these questions and more, join us on Wednesday, June 13, at 11:30 a.m. for an Executive Roundtable Luncheon, "Cybersecurity and the Next Steps in Continuous Monitoring." Matthew McCormack, CISO, Defense Intelligence...
10th Annual Technology & Government Din...
On June 13, 2012, TechAmerica Foundation will host its Tenth Annual Technology and Government Dinner at the Ronald Reagan Building in Washington DC. The dinner continues to serve as the premier Washington, DC technology networking event bringing hundreds of tech industry, congressional, and government leaders together at one venue to celebrate the partnership between industry and government. The evening will begin with a cocktail reception and...
Keeping Up: Are Agencies Equipped to Me...
Government Executive’s Government Business Council invites you to be among the first to see new research findings in a complimentary webcast: Keeping Up: Are Agencies Equipped to Meet Mobile Needs? Wednesday, June 13, 2012 2:00 PM EDT The federal workforce operates in an increasingly mobile environment, requiring secure communication tools to stay connected and maximize productivity. Many agencies have found success leveraging advanced...
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
Big MACs 2011 Webinar
Join Bloomberg Government and Privia for a presentation and discussion on the growth of multiple-award contracts in 2011. BGOV will present the latest findings from our ongoing analysis of the number, value and growing use of multiple-award contracts.
Protect Access to Cloud-Based Applicati...
Multi-factor authentication – whether through the use of one-time password (OTP) tokens, certificates, USB tokens, or smart cards – has grown increasingly critical as organizations look to secure remote users’ access to sensitive data. As enterprises move increasingly strategic services to the cloud, security teams will need to leverage centralized mechanisms that accommodate both traditional remote access scenarios and cloud...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.